2014 saw a significant jump in the quantity, quality and prevalence of point-of-sale malware attacks. These malicious creations, commonly referred to as PoS RAM Scrapers are designed to compromise the terminals used by businesses the world over to carry out retail transactions. Tens of millions of payment card details are routinely stolen, sometimes in a…

Earlier this week, Ben Lawsky, head of The New York State Department of Financial Services (NYDFS), addressed attendees at Columbia Law School where he stated that he is currently considering new rules for banks and insurance companies regulated by NYDFS to raise cybersecurity standards. Lawsky also noted his concern that the financial industry could face…

Every day it seems we need to create a new account online and with each new account comes the added risk of our personal information being stolen. Managing passwords to online accounts is not a simple matter. We could all use a little help. Using a password manager like Trend Micro™ Password Manager to help…

Many across the globe have read the stress management and self-help book series by Richard Carlson, Don’t Sweat the Small Stuff. Certainly the basic premise is to make sure you focus on the important things in life. Important is rather subjective to us all. Just as it is difficult to determine what is absolutely critical…

It’s not as concise as just three words but I think the slogan “crime doesn’t pay” should be expanded to include “…and neither does despicable online behavior.” About a year and a half ago, I wrote a blog about revenge porn – a form of cyberbullying. At the time, a number of US states were…

What do you call a year that started with one of the biggest data breaches ever, affecting Target, and closed with another big data breach causing significant damage to a Hollywood studio? What do you call a year that saw a return to the bad old days of scrambling to patch vulnerabilities in widely deployed…

If you take a moment to think like cybercriminals do, you will start to see why smaller businesses and non-profits have become their favorite targets. Though they tend to be more sophisticated than “smash-and-grab” robbers, cybercrooks are looking for the easiest way to rip off valuable digital data. They want to attack “low-hanging fruit,” which…

Pardon us for this, but sometimes we just have to brag a little. Trend Micro™ Internet Security was just named the “Best Protection” of 2014 against viruses and other threats. We’re proud of this recognition for our continuous work to safeguard our customers against today’s online threats. It is Hollywood’s award season, and even though…

The role of the chief information security officer has come a long way since the early days of the cybersecurity industry. As the value of sensitive data has grown – to organizations and cybercriminals alike – so has the position of CISO, in a way barely even imagined a decade ago. Firms like Target, JPMorgan…

At Trend Micro, we’re constantly learning from our customers; from the challenges they’re facing to their strategic security postures, they each hold a treasure trove of hard-earned wisdom. In an effort to share some of this wisdom, we’ll be interviewing some of our most noteworthy customers for a new blog series we’re calling “Five Questions.”…